-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Implementing Cellular IoT Solutions for Digital Transformation
By :

Because of the complexity of developing an end-to-end IoT solution, developers and IoT solution/system integrators typically use readily available IoT components to create their enterprise IoT solutions. Although this is easier, it tends to mean less focus on the integration points for these disparate IoT solution components and closing the security gaps that may exist. As such, security flaws and vulnerabilities go hidden and become part of the overall IoT solution. Once the enterprise IoT solution is deployed, the security risks and vulnerable attack surfaces are exposed.
In the context of an end-to-end enterprise IoT solution, there are several security attack surfaces, including the device and interfaces between the IoT solution architecture components. In Chapter 6, Reviewing Cellular IoT Devices with Use Cases, we reviewed the generic components of an IoT device. From a security attack perspective, the device and module firmware, physical inputs/outputs...
Change the font size
Change margin width
Change background colour